Establishing a zero trust strategy in cloud computing environment S Mehraj, MT Banday 2020 International Conference on Computer Communication and Informatics …, 2020 | 134 | 2020 |
Applications of e-Learning in engineering education: A case study MT Banday, M Ahmed, TR Jan Procedia-Social and Behavioral Sciences 123, 406-413, 2014 | 106 | 2014 |
Study of Botnets and their threats to Internet Security MT Banday, JA Qadri, NAS Shah Sprouts: Working Papers on Information Systems 9 (24), 2009 | 64 | 2009 |
Social media in E-governance: A study with special reference to India MT Banday, MM Mattoo Scientific Research Publishing, 2013 | 57 | 2013 |
Techniques and Tools for Forensic Investigation of E-mail MT Banday International Journal of Network Security & Its Applications (IJNSA) 3 (6 …, 2011 | 50 | 2011 |
A study of CAPTCHAs for securing web services MT Banday, NA Shah arXiv preprint arXiv:1112.5605, 2011 | 46 | 2011 |
Phishing-A Growing Threat to E-Commerce MT Banday, JA Qadri Arxiv preprint arXiv:1112.5732, 2011 | 37 | 2011 |
Effectiveness and limitations of statistical spam filters MT Banday, TR Jan arXiv preprint arXiv:0910.2540, 2009 | 37 | 2009 |
Effectiveness and limitations of e-mail security protocols MT Banday International Journal of Distributed and Parallel Systems (IJDPS) Vol 2, 2011 | 35 | 2011 |
Technology Corner: Analysing e-mail headers for forensic investigation MT Banday Journal of Digital Forensics, Security and Law 6 (2), 5, 2011 | 35 | 2011 |
Efficient design of nano scale adder and subtractor circuits using quantum dot cellular automata JI Reshi, MT Banday IET Digital Library, 2016 | 31 | 2016 |
Review of transportation mode detection techniques J Biancat, C Brighenti, A Brighenti EAI Endorsed Transactions on Ambient Systems 1 (4), 2014 | 31 | 2014 |
Image Flip CAPTCHA. MT Banday, NA Shah ISeCure 1 (2), 2009 | 31 | 2009 |
Analyzing Internet e-mail date-spoofing MT Banday, FA Mir, JA Qadri, NA Shah Digital Investigation 7 (3-4), 145–153, 2011 | 20 | 2011 |
A study of recent advances in cache memories MT Banday, M Khan 2014 International Conference on Contemporary Computing and Informatics …, 2014 | 19 | 2014 |
A novel comparator-a cryptographic design in quantum dot cellular automata S Umira, R Qadri, ZA Bangi, MT Banday 2018 International Conference on Sustainable Energy, Electronics, and …, 2018 | 18 | 2018 |
Analysis and optimization of advanced encryption standard for the internet of things I Sultan, BJ Mir, MT Banday 2020 7th International Conference on Signal Processing and Integrated …, 2020 | 16 | 2020 |
Green Internet of Things: A survey of enabling techniques T Nazir, MT Banday 2018 International Conference on Automation and Computational Engineering …, 2018 | 15* | 2018 |
Experimental analysis of DDoS attack and it's detection in Eucalyptus private cloud platform AH Dar, B Habib, F Khurshid, MT Banday 2016 International Conference on Advances in Computing, Communications and …, 2016 | 15 | 2016 |
Recent Developments in the Domain Name System MT Banday International Journal of Computer Applications 31 (2), 18-25, 2011 | 15 | 2011 |